Seminal Papers

Here is the list of papers for this project.
It includes only those papers not protected by copyright
(because of the difficulty in obtaining permission).
If we get additional funding, we will expand it to include
others, and try to secure permission to reproduce them.
These are listed alphabetically
by author or (if no author) title.

Committee on Multilevel Data Management Security,
Multilevel Data Management Security,
Air Force Studies Board, Commission on Engineering and Technical Systems,
National Research Council, National Academy Press (1983)
Popularly known as the "Woods Hole Report," this was a major,
influential study of database security

Department of Defense Computer Security Evaluation Center,
Trusted Computer System Evaluation Criteria (1982)
First version of the TCSEC made available to the public, it is also
called the Powder Blue TCSEC

Department of Defense Computer Security Evaluation Center;
Trusted Computer
System Evaluation Criteria (Orange Book); (1983, 1985)
[PDF]
Full version of the TCSEC that influenced study and development of
systems

DeWolf, B. and Szulewski, P.,
Final Report of the 1979 Summer
Study on Air Force Computer Security (1979)
Also called the Draper Report,
this describes the state of the art at that time

Ford Aerospace,
Secure Minicomputer Operating System (KSOS) (1978)
[PDF]
Describes an implementation of a provably secure operating system
compatible with the UNIX operating system

Papa Hegel he say that all we learn from history is that we learn
nothing from history. I know people who can't even learn from what happened
this morning. Hegel must have been taking the long view. -- Chad C. Mulligan,
"The Hipcrime Vocab"